US court strikes down net neutrality: What's next?
The U.S. Federal Communications Commission and its allies have several options, with most of them difficult, after a U.S. appeals court struck down most of the agency's 2010 net neutrality rules.
The U.S. Federal Communications Commission and its allies have several options, with most of them difficult, after a U.S. appeals court struck down most of the agency's 2010 net neutrality rules.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Technology users -- retailers, in particular -- are being snared in patent infringement lawsuits, prompting Congress to eye reforms that could change how lawsuits are filed and who pays if they're frivolous.
After almost a decade of litigation, Google scored a victory last week over the Authors Guild, which had sued the company for copyright infringement over its Google Books search engine. But a few important chapters in the legal saga have yet to be written.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
Samsung took a step toward finding a kind of "pax tabletica" with arch-foe Apple in an Australian court last week, offering to remove features from its Galaxy Tab to avoid a court ban on sales of the device in that country. But what's really interesting about the case isn't the technical litigation, but the underlying attempt to define how much of a product's design is actually protected under existing, fragmented international laws.
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.